• Australis13@fedia.io
    link
    fedilink
    arrow-up
    22
    ·
    19 hours ago

    Rather impressive how quickly the hackers reverse-engineered Microsoft’s patch and used the vulnerability whilst the opportunity was still available:

    The threat group, tracked under names including APT28, Fancy Bear, Sednit, Forest Blizzard, and Sofacy, pounced on the vulnerability, tracked as CVE-2026-21509, less than 48 hours after Microsoft released an urgent, unscheduled security update late last month, the researchers said. After reverse-engineering the patch, group members wrote an advanced exploit that installed one of two never-before-seen backdoor implants.